메뉴 건너뛰기




Volumn , Issue , 2009, Pages 338-347

Privacy-preserving genomic computation through program specialization

Author keywords

Dynamic programming; Human genome; Privacy preserving computation; Program specialization; Secure multi party computation; Symbolic execution

Indexed keywords

COMPUTATION PROGRAM; HUMAN GENOMES; PRIVACY PRESERVING; SECURE MULTI-PARTY COMPUTATION; SYMBOLIC EXECUTION;

EID: 74049087814     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1653662.1653703     Document Type: Conference Paper
Times cited : (72)

References (69)
  • 1
    • 84872262557 scopus 로고    scopus 로고
    • Argo genome browser. http://www.genome.wi.mit.edu/annotation/argo/.
    • Argo genome browser
  • 8
    • 33845946966 scopus 로고
    • analysis and specialization for the c programming language. Phd thesis, Department of Computer Science, University of Copenhagen, May
    • L. O. Andersen. Program analysis and specialization for the c programming language. Phd thesis, Department of Computer Science, University of Copenhagen, May 1994.
    • (1994) Program
    • Andersen, L.O.1
  • 9
    • 39849111033 scopus 로고    scopus 로고
    • miRNAminer: A tool for homologous microRNA gene search
    • S. Artzi, A. Kiezun, and N. Shomron. miRNAminer: a tool for homologous microRNA gene search. BMC Bioinformatics, 9:39, 2008.
    • (2008) BMC Bioinformatics , vol.9 , pp. 39
    • Artzi, S.1    Kiezun, A.2    Shomron, N.3
  • 13
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations
    • Technical Report ESD-TR-73-278, Hanscom AFB, Bed-ford, Mass, November
    • D. E. Bell and L. J. LaPadula. Secure computer systems: Mathematical foundations. Technical Report ESD-TR-73-278, Hanscom AFB, Bed-ford, Mass., November 1973.
    • (1973)
    • Bell, D.E.1    LaPadula, L.J.2
  • 14
    • 37049252093 scopus 로고
    • Dynamic programming
    • R. Bellman. Dynamic programming. Science, 153(3731):34-37, 1966.
    • (1966) Science , vol.153 , Issue.3731 , pp. 34-37
    • Bellman, R.1
  • 15
    • 77958496068 scopus 로고    scopus 로고
    • Privacy-preserving matching of dna profiles
    • Technical Report Report 2008/203, ACR Cryptology ePrint Archive, 2008
    • F. Bruekers, S. Katzenbeisser, K. Kursawe, and P. Tuyls. Privacy-preserving matching of dna profiles. Technical Report Report 2008/203, ACR Cryptology ePrint Archive, 2008.
    • Bruekers, F.1    Katzenbeisser, S.2    Kursawe, K.3    Tuyls, P.4
  • 20
    • 0027807053 scopus 로고
    • Semantics-directed generation of a prolog compiler
    • C. Consel and S. C. Khoo. Semantics-directed generation of a prolog compiler. Sci. Comput. Program., 21(3):263-291, 1993.
    • (1993) Sci. Comput. Program , vol.21 , Issue.3 , pp. 263-291
    • Consel, C.1    Khoo, S.C.2
  • 23
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. E. Denning. A lattice model of secure information flow. Commun. ACM, 19(5):236-243, 1976.
    • (1976) Commun. ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 25
    • 74049153571 scopus 로고    scopus 로고
    • B. Dutertre and L. Moura. The YICES SMT Solver. http://yices.csl.sri.com/ , as of 2008.
    • B. Dutertre and L. Moura. The YICES SMT Solver. http://yices.csl.sri.com/ , as of 2008.
  • 27
    • 79959503826 scopus 로고    scopus 로고
    • The international hapmap project
    • R. Gibbs. The international hapmap project. Nature (London), 426:789, 2003.
    • (2003) Nature (London) , vol.426 , pp. 789
    • Gibbs, R.1
  • 30
    • 0020484488 scopus 로고
    • An improved algorithm for matching biological sequences
    • December
    • O. Gotoh. An improved algorithm for matching biological sequences. J Mol Biol, 162(3):705-708, December 1982.
    • (1982) J Mol Biol , vol.162 , Issue.3 , pp. 705-708
    • Gotoh, O.1
  • 33
    • 13144306071 scopus 로고    scopus 로고
    • Genome-wide association studies for common diseases and complex traits
    • February
    • J. N. Hirschhorn and M. J. Daly. Genome-wide association studies for common diseases and complex traits. Nature Reviews Genetics, 6(2):95-108, February 2005.
    • (2005) Nature Reviews Genetics , vol.6 , Issue.2 , pp. 95-108
    • Hirschhorn, J.N.1    Daly, M.J.2
  • 38
    • 46649114758 scopus 로고    scopus 로고
    • Scipio: Using protein sequences to determine the precise exon/intron structures of genes and their orthologs in closely related species
    • O. Keller, F. Odronitz, M. Stanke, M. Kollmar, and S. Waack. Scipio: using protein sequences to determine the precise exon/intron structures of genes and their orthologs in closely related species. BMC Bioinformatics, 9:278, 2008.
    • (2008) BMC Bioinformatics , vol.9 , pp. 278
    • Keller, O.1    Odronitz, F.2    Stanke, M.3    Kollmar, M.4    Waack, S.5
  • 42
    • 0016971687 scopus 로고
    • Symbolic execution and program testing
    • J. C. King. Symbolic execution and program testing. Commun. ACM, 19(7):385-394, 1976.
    • (1976) Commun. ACM , vol.19 , Issue.7 , pp. 385-394
    • King, J.C.1
  • 43
    • 0035094764 scopus 로고    scopus 로고
    • Variation is the spice of life
    • Mar
    • L. Kruglyak and D. Nickerson. Variation is the spice of life. Nat. Genet., 27:234-236, Mar 2001.
    • (2001) Nat. Genet , vol.27 , pp. 234-236
    • Kruglyak, L.1    Nickerson, D.2
  • 44
    • 74049144768 scopus 로고    scopus 로고
    • N. Li and T. Li. t-closeness: Privacy beyond k-anonymity and âĎŞ-diversity. In In Proceedings of IEEE International Conference on Data Engineering, 2007.
    • N. Li and T. Li. t-closeness: Privacy beyond k-anonymity and âĎŞ-diversity. In In Proceedings of IEEE International Conference on Data Engineering, 2007.
  • 45
    • 0036202921 scopus 로고    scopus 로고
    • faster and more sensitive homology search
    • Mar
    • B. Ma, J. Tromp, and M. Li. Patternhunter: faster and more sensitive homology search. Bioinformatics, 18(3):440-445, Mar 2002.
    • (2002) Bioinformatics , vol.18 , Issue.3 , pp. 440-445
    • Ma, B.1    Tromp, J.2    Patternhunter, M.L.3
  • 47
    • 74049094956 scopus 로고    scopus 로고
    • Protecting dna sequence anonymity with generalization lattices
    • Technical Report CMU-ISRI-04-134, Carnegie Mellon University, As of October 2007
    • B. Malin. Protecting dna sequence anonymity with generalization lattices. Technical Report CMU-ISRI-04-134, Carnegie Mellon University, As of October 2007.
    • Malin, B.1
  • 48
    • 0016942292 scopus 로고
    • A space-economical suffix tree construction algorithm
    • E. M. McCreight. A space-economical suffix tree construction algorithm. J. ACM, 23(2):262-272, 1976.
    • (1976) J. ACM , vol.23 , Issue.2 , pp. 262-272
    • McCreight, E.M.1
  • 52
    • 0032646625 scopus 로고    scopus 로고
    • A. C. Myers. Jflow: Practical mostly-static information flow control. In In Proc. 26th ACM Symp. on Principles of Programming Languages POPL, pages 228-241, 1999.
    • A. C. Myers. Jflow: Practical mostly-static information flow control. In In Proc. 26th ACM Symp. on Principles of Programming Languages (POPL, pages 228-241, 1999.
  • 53
    • 0001048139 scopus 로고    scopus 로고
    • Protecting privacy using the decentralized label model
    • A. C. Myers and B. Liskov. Protecting privacy using the decentralized label model. ACM Trans. Softw. Eng. Methodol., 9(4):410-442, 2000.
    • (2000) ACM Trans. Softw. Eng. Methodol , vol.9 , Issue.4 , pp. 410-442
    • Myers, A.C.1    Liskov, B.2
  • 54
    • 0023984847 scopus 로고
    • Optimal alignments in linear space
    • E. W. Myers and W. Miller. Optimal alignments in linear space. CABIOS, 4:11-17, 1988.
    • (1988) CABIOS , vol.4 , pp. 11-17
    • Myers, E.W.1    Miller, W.2
  • 56
    • 0014757386 scopus 로고    scopus 로고
    • W. C. Needleman SB. A general method applicable to the search for similarities in the amino acid sequence of two proteins. J Mol Biol, 48(3):443-453, 1970.
    • W. C. Needleman SB. A general method applicable to the search for similarities in the amino acid sequence of two proteins. J Mol Biol, 48(3):443-453, 1970.
  • 58
    • 43349098885 scopus 로고    scopus 로고
    • Exalign: A new method for comparative analysis of exon-intron gene structures
    • May
    • G. Pavesi, F. Zambelli, C. Caggese, and G. Pesole. Exalign: a new method for comparative analysis of exon-intron gene structures. Nucleic Acids Res., 36:e47, May 2008.
    • (2008) Nucleic Acids Res , vol.36
    • Pavesi, G.1    Zambelli, F.2    Caggese, C.3    Pesole, G.4
  • 61
    • 18744398125 scopus 로고    scopus 로고
    • Large-scale database searching using tandem mass spectra: Looking up the answer in the back of the book
    • Dec
    • R. G. Sadygov, D. Cociorva, and J. R. Yates. Large-scale database searching using tandem mass spectra: looking up the answer in the back of the book. Nat. Methods, 1:195-202, Dec 2004.
    • (2004) Nat. Methods , vol.1 , pp. 195-202
    • Sadygov, R.G.1    Cociorva, D.2    Yates, J.R.3
  • 64
    • 0019887799 scopus 로고    scopus 로고
    • W. M. Smith TF. Identification of common molecular subsequences. J Mol Biol, 147:195, 1981.
    • W. M. Smith TF. Identification of common molecular subsequences. J Mol Biol, 147:195, 1981.
  • 66
    • 0032964297 scopus 로고    scopus 로고
    • Blast 2 sequences - a new tool for comparing protein and nucleotide sequences
    • T. A. Tatusova and T. L. Madden. Blast 2 sequences - a new tool for comparing protein and nucleotide sequences. FEMS Microbiology Letters, 174:247-250, 1999.
    • (1999) FEMS Microbiology Letters , vol.174 , pp. 247-250
    • Tatusova, T.A.1    Madden, T.L.2
  • 67
    • 28644447919 scopus 로고    scopus 로고
    • Identification of post-translational modifications by blind search of mass spectra
    • Dec
    • D. Tsur, S. Tanner, E. Zandi, V. Bafna, and P. A. Pevzner. Identification of post-translational modifications by blind search of mass spectra. Nat. Biotechnol., 23:1562-1567, Dec 2005.
    • (2005) Nat. Biotechnol , vol.23 , pp. 1562-1567
    • Tsur, D.1    Tanner, S.2    Zandi, E.3    Bafna, V.4    Pevzner, P.A.5
  • 68
    • 74049106420 scopus 로고    scopus 로고
    • Privacy-preserving genomic computation through program specialization
    • Technical Report IUCS-TR679, Indiana University
    • R. Wang, X. Wang, Z. Li, H. Tang, M. K. Reiter, and Z. Dong. Privacy-preserving genomic computation through program specialization. Technical Report IUCS-TR679, Indiana University, 2009.
    • (2009)
    • Wang, R.1    Wang, X.2    Li, Z.3    Tang, H.4    Reiter, M.K.5    Dong, Z.6
  • 69
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • A. Yao. How to generate and exchange secrets. In FOCS, 1986.
    • (1986) FOCS
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.